• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • SINTEF
  • Publikasjoner fra CRIStin
  • Publikasjoner fra CRIStin - SINTEF AS
  • View Item
  •   Home
  • SINTEF
  • Publikasjoner fra CRIStin
  • Publikasjoner fra CRIStin - SINTEF AS
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Planning of an Offshore Well Plugging Campaign: A Vehicle Routing Approach

Bakker, Steffen J.; Aarlott, Mats Mathisen; Tomasgard, Asgeir; Midthun, Kjetil Trovik
Peer reviewed, Journal article
Accepted version
Thumbnail
View/Open
Accepted manuscript (809.9Kb)
URI
https://hdl.handle.net/11250/2720885
Date
2017
Metadata
Show full item record
Collections
  • Publikasjoner fra CRIStin - SINTEF AS [4370]
  • SINTEF Industri [1126]
Original version
Lecture Notes in Computer Science. 2017, 10572 158-173.   https://doi.org/10.1007/978-3-319-68496-3_11
Abstract
When a petroleum well no longer serves its purpose, the operator is required to plug and abandon (P&A) the well to avoid contamination of reservoir fluids. An increasing number of offshore wells needs to be P&A’d in the near future, and the costs of these operations are substantial. Research on planning methods in order to allocate vessels that are required to perform these operations in a cost-efficient manner is therefore essential. We use an optimization approach and propose a mixed integer linear programming model based on a variant of the uncapacitated vehicle routing problem that includes precedence and non-concurrence constraints to plan a plugging campaign. P&A costs are minimized by creating optimal routes for a set of vessels, such that all operations that are needed to P&A a set of development wells are executed. In a case study, we show that our proposed optimization approach may lead to significant cost savings compared to traditional planning methods and is well suited for P&A planning purposes on a tactical level.
Publisher
Springer
Journal
Lecture Notes in Computer Science
Copyright
This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-68496-3_11

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit